IT Perspective

August 15, 2018
How to Take Advantage of Federal Fiscal Year-End as a Vendor premium
An irony of late appropriations – as the federal government experienced for the umpeenth time in fiscal 2018 – is that rather than rush to spend, your federal customers are actually spending at rates below what they’re authorized to spend. That makes it harder to maximize the year-end spending blitz. It takes some doing, but […]
premium
tom.temin@gmail.com'
Federal Agencies are Playing a Game of Hope with Two-Factor Authentication premium
Shortly after the federal government suffered it’s largest and costliest data breach ever at the Office of Personnel Management (OPM), a post-mortem analysis found that the breach was entirely preventable, and the exfiltration of security clearance files of government employees and contractors could have been prevented through the implementation of two-factor authentication for remote log-ons. […]
premium
bradley.gernat@dlt.com'
What Agencies Need to Consider When Updating Password Protocols in 2018 premium
Movies and TV would have us believe that data breaches are long, hard-fought battles between the good guy and the bad guy—and the bad guy wins. That could not be further from reality. Hackers are opportunistic. They want to spend as little time as possible getting into the system, getting what they need, getting out, […]
premium
fking@speakerboxpr.com'
Meet GovDesignHub: At the Crossroads of Public Sector and Digital Design premium
The CAD and digital design sector is vast and growing at breakneck speed. It’s expected to reach $11.21 billion by 2023. Many end-use industries such as automotive, aerospace, entertainment, industrial machinery, civil and construction, electrical and electronics, pharmaceutical, and healthcare, consumer goods, and others, widely use CAD and 3D design-based tools in their development processes. […]
premium
DLT Solutions
Revit 2019 is Here. It Has Everything You Asked For. premium
Aside from developing one of the sought after building information modeling (BIM) software in the industry today, you’ve got to hand it to the Revit product managers over at Autodesk—they listen. Revit 2019 is here and the flagship BIM program delivers on many of the suggestions and feedback that Autodesk solicits on its Revit Ideas […]
premium
Autodesk Tech Writer
Key Findings of 2018 Cyber Threat Report and How Government Can Respond premium
Symantec’s 2018 Internet Security Threat Report is here. Based on data collected by Symantec’s massive security infrastructure (the largest civilian threat collection network in the world), the report has become the de facto standard for giving enterprises and public organizations essential information to help secure their systems effectively. By the nature of the topic, the […]
premium
DLT Solutions
After Atlanta SamSam Ransomware Attack, Learn How to Better Protect your Agency premium
Another day, another government ransomware victim. On March 22nd, 2018, the city of Atlanta found itself locked out of computers across government offices and facing a ransom demand of $51,000 or $6,800 per computer, GCN reported. The attack affected internal systems and citizen-facing apps that residents use to pay bills and access court-related information. The […]
premium
DLT Solutions
Breakthrough in Ransomware Prevention is Good News for Government Agencies premium
Ransomware is quickly becoming the favored means for criminals to extract a profit from unsuspecting villains – most notably in the public sector. Throughout 2017 ransomware grabbed the headlines – WannaCry, Petya, etc. – both of which targeted government agencies. When they succeed the implications can be serious. Licking County in Ohio fell victim to […]
premium
DLT Solutions
Active Directory’s Attack Surface is Huge – Here’s How to Find a Threat Needle in its Log Haystack premium
Microsoft Active Directory is a critical tool that helps system administrators manage user privileges and secure their IT infrastructure, yet Active Directory presents several security challenges. Most problematic is that Active Directory’s attack surface is huge. Targets for attack include every domain name user account, admin and security group, domain controller, backup, admin workstation, and […]
premium
bradley.gernat@dlt.com'
February 1, 2018
The Automated Enterprise premium
Automation, more specifically IT Automation. What is it, who’s using it, why is it important? Lets start with what it is. . . IT Automation is the use of software to create repeatable instructions and processes, also known as a playbook, with the intention of replacing or reducing the amount of human interaction required with […]
premium
sam.biesenbach@dlt.com'

Privacy Preference Center

Close your account?

Your account will be closed and all data will be permanently deleted and cannot be recovered. Are you sure?

Are you sure?

By disagreeing you will no longer have access to our site and will be logged out.